Displaying 1-6 of 6 results

Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?